Robust Protection of Networks against Cascading Phenomena
暂无分享,去创建一个
[1] Amin Saberi,et al. On the spread of viruses on the internet , 2005, SODA '05.
[2] Roger Wattenhofer,et al. Word of Mouth: Rumor Dissemination in Social Networks , 2008, SIROCCO.
[3] Andreas Krause,et al. Cost-effective outbreak detection in networks , 2007, KDD '07.
[4] Shishir Bharathi,et al. Competitive Influence Maximization in Social Networks , 2007, WINE.
[5] Robert E. Tarjan,et al. Fast Algorithms for Finding Nearest Common Ancestors , 1984, SIAM J. Comput..
[6] Ahmed Helmy,et al. Encounter-based worms: analysis and defense , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.
[7] Stefan Schmid,et al. On the windfall of friendship: inoculation strategies on social networks , 2008, EC '08.
[8] M. L. Fisher,et al. An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..
[9] Divyakant Agrawal,et al. Limiting the spread of misinformation in social networks , 2011, WWW.
[10] Chaitanya Swamy,et al. Approximability of the Firefighter Problem , 2012, Algorithmica.
[11] Wei Xu,et al. Toward worm detection in online social networks , 2010, ACSAC '10.
[12] Stefan M. Wild,et al. Maximizing influence in a competitive social network: a follower's perspective , 2007, ICEC.
[13] Aravind Srinivasan,et al. Modelling disease outbreaks in realistic urban social networks , 2004, Nature.
[14] Wei Chen,et al. Efficient influence maximization in social networks , 2009, KDD.
[15] Pradeep Dubey,et al. Competing for Customers in a Social Network: The Quasi-linear Case , 2006, WINE.
[16] Matthew Richardson,et al. Mining knowledge-sharing sites for viral marketing , 2002, KDD.
[17] Michael A. Bender,et al. The LCA Problem Revisited , 2000, LATIN.
[18] Laurence A. Wolsey,et al. An analysis of the greedy algorithm for the submodular set covering problem , 1982, Comb..
[19] Andreas Krause,et al. Submodular Function Maximization , 2014, Tractability.
[20] David Kempe,et al. Unbalanced Graph Cuts , 2005, ESA.
[21] Jure Leskovec,et al. Inferring networks of diffusion and influence , 2010, KDD.
[22] M. Mitzenmacher,et al. Probability and Computing: Chernoff Bounds , 2005 .
[23] Po-An Chen,et al. Better vaccination strategies for better people , 2010, EC '10.
[24] Alexander Shapiro,et al. A simulation-based approach to two-stage stochastic programming with recourse , 1998, Math. Program..
[25] Nam P. Nguyen,et al. Containment of misinformation spread in online social networks , 2012, WebSci '12.
[26] Toshihiro Fujito,et al. Approximation algorithms for submodular set cover with applications , 2000 .
[27] Masahiro Kimura,et al. Minimizing the Spread of Contamination by Blocking Links in a Network , 2008, AAAI.
[28] James Aspnes,et al. Inoculation strategies for victims of viruses and the sum-of-squares partition problem , 2005, SODA '05.
[29] A. Barabasi,et al. Halting viruses in scale-free networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[30] Gwen Spencer. Robust Cuts Over Time: Combatting the Spread of Invasive Species with Unreliable Biological Control , 2012, AAAI.
[31] Alexander Grey,et al. The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .
[32] Donald F. Towsley,et al. The effect of network topology on the spread of epidemics , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[33] H. B. McMahan,et al. Robust Submodular Observation Selection , 2008 .
[34] Masahiro Kimura,et al. Extracting Influential Nodes for Information Diffusion on a Social Network , 2007, AAAI.
[35] Matthew Richardson,et al. Mining the network value of customers , 2001, KDD '01.
[36] David B. Shmoys,et al. Maximizing the Spread of Cascades Using Network Design , 2010, UAI.
[37] Yifei Yuan,et al. Scalable Influence Maximization in Social Networks under the Linear Threshold Model , 2010, 2010 IEEE International Conference on Data Mining.